droe / sslsplit

Transparent SSL/TLS interception
https://www.roe.ch/SSLsplit
BSD 2-Clause "Simplified" License
1.75k stars 328 forks source link

Received privsep problem after updating #243

Closed max-maximus closed 5 years ago

max-maximus commented 5 years ago

Hi, After almost a month of troubleshooting and researching... It got me here. I found some issues about privsep and privilege droping to user nobody (believe this is my problem )but I don't know what to do. Please help

Generated RSA key for leaf certs. SSLsplit 0.5.3 (built 2018-07-28) Copyright (c) 2009-2018, Daniel Roethlisberger daniel@roe.ch https://www.roe.ch/SSLsplit Build info: V:FILE HDIFF:0 N:659a166 Features: -DHAVE_NETFILTER NAT engines: netfilter* tproxy netfilter: IP_TRANSPARENT IP6T_SO_ORIGINAL_DST Local process info support: no compiled against OpenSSL 1.1.0h 27 Mar 2018 (1010008f) rtlinked against OpenSSL 1.1.0h 27 Mar 2018 (1010008f) OpenSSL has support for TLS extensions TLS Server Name Indication (SNI) supported OpenSSL is thread-safe with THREADID Using SSL_MODE_RELEASE_BUFFERS SSL/TLS protocol availability: tls10 tls11 tls12 SSL/TLS algorithm availability: !SHA0 RSA DSA ECDSA DH ECDH EC OpenSSL option availability: SSL_OP_NO_COMPRESSION SSL_OP_NO_TICKET SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION SSL_OP_TLS_ROLLBACK_BUG compiled against libevent 2.1.8-stable rtlinked against libevent 2.1.8-stable 4 CPU cores detected SSL/TLS protocol: negotiate proxyspecs:

sonertari commented 5 years ago

SSLsplit 0.5.4 is released, so please try the latest version. And what is the issue?

max-maximus commented 5 years ago

I still get same privsep messages

SSLsplit 0.5.4-2-g3940e75 (built 2018-11-02) Copyright (c) 2009-2018, Daniel Roethlisberger daniel@roe.ch https://www.roe.ch/SSLsplit Build info: V:GIT Features: -DHAVE_NETFILTER NAT engines: netfilter* tproxy netfilter: IP_TRANSPARENT IP6T_SO_ORIGINAL_DST Local process info support: no compiled against OpenSSL 1.1.1 11 Sep 2018 (1010100f) rtlinked against OpenSSL 1.1.1 11 Sep 2018 (1010100f) OpenSSL has support for TLS extensions TLS Server Name Indication (SNI) supported OpenSSL is thread-safe with THREADID OpenSSL has engine support Using SSL_MODE_RELEASE_BUFFERS SSL/TLS protocol availability: tls10 tls11 tls12 SSL/TLS algorithm availability: !SHA0 RSA DSA ECDSA DH ECDH EC OpenSSL option availability: SSL_OP_NO_COMPRESSION SSL_OP_NO_TICKET SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION SSL_OP_TLS_ROLLBACK_BUG compiled against libevent 2.1.8-stable rtlinked against libevent 2.1.8-stable compiled against libnet 1.1.6 rtlinked against libnet 1.1.6 compiled against libpcap n/a rtlinked against libpcap 1.8.1 4 CPU cores detected Non spoofing imap.gmail.com Non spoofing to 127.0.0.1 Specific domain IP .domain.com with 192.168.1.1 DNS Forwarding activado.... binded to UDP port 53. waiting requests. Generated RSA key for leaf certs. SSL/TLS protocol: negotiate proxyspecs:

sonertari commented 5 years ago

What is the issue? What are the "privsep messages" you are talking about? I don't see any error messages in the output you have posted above. The privsep messages above seem fine to me.

Yes, you probably should try a user other than nobody, e.g. try with root, but what is the problem first?

max-maximus commented 5 years ago

If the output seems fine to you, then there is no problem. I've never seen those messages in output before... My bed. Sorry for disturbance and thank you for your response.

sonertari commented 5 years ago

No problem, I'm closing this issue.